Guidelines For The ‘Catastrophic Risks’ Of AI

Governments are waking up to the transformative challenge that Artificial Intelligence (AI) presents and there have been rapid movements internationally, including the USA, the European Union and Chinato contain and manage the threats and opportunities of this rapidly developing technology 

Now, OpenAI, the creator of ChatGPT, has taken the initiative and published its own guidelines for assessing possible “catastrophic risks” of Artificial Intelligence (AI) in models. This announcement follows  the firm’s CEO Sam Altman being fired by the board and then re-hired after staff and investors rebelled.

The company’s statement, titled “Preparedness Framework,” reads: “We believe the scientific study of catastrophic risks from AI has fallen far short of where we need to be.”

According to Techxplore, the framework is meant to help address this gap. A monitoring and evaluation team will focus on “frontier models” that are currently being developed (extremely high-capability models).  The team will then individually assess the models and assign them a level of risk, from “low” to “critical,” in four main categories.

Only models with a risk score of “medium” or below will be approved to be deployed. The four risk categories are as follows:  

  • The first category concerns cyber security and the model’s ability to carry out large-scale cyberattacks.
  • The second category will measure the software’s inclination to help create things that could be harmful to humans (a chemical mixture, an organism like a virus, or a nuclear weapon).
  • The third category concerns the model’s power of persuasion and the extent to which it is able to influence human behaviour.
  • The fourth category concerns the model’s potential autonomy, and more specifically whether it can escape the control of its creators.

Then, once the risks have been identified, the team will submit it to OpenAI’s Safety Advisory Group,  a new body whose task is to make appropriate recommendations either to the CEO or to a person appointed by him, who will then decide on the changes the model in question requires to reduce the risks.

OpenAI:     The Hill:    I-HLS:    TechXplore:      NDTV:    Hindustan Times:     Xinhua:   

Image: Maria Shalabaieva

You Might Also Read:

The AI Dilemma: Regulate, Monopolize, Or Liberate:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Students Should Learn About Phishing 
Cyber Security Jobs In 2025 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Defense Advanced Research Projects Agency (DARPA)

Defense Advanced Research Projects Agency (DARPA)

DARPA's mission is to develop breakthrough technologies for national security. The Information Innovation Office undertakes cyber security activities.

Security Current

Security Current

Security Current's proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.

Continuum

Continuum

Continuum is the IT management platform company that allows Managed IT Services Providers to maintain and back up on-premise and cloud-based servers, desktops, mobile devices and other endpoints

Mega

Mega

Mega is a secure cloud data storage provider with browser-based high-performance end-to-end encryption.

Deltagon

Deltagon

Deltagon develops information security solutions to protect companies’ confidential information in e-communication and e-services.

Sungard Availability Services (Sungard AS)

Sungard Availability Services (Sungard AS)

Sungard AS partners with customers around the globe to understand their unique business needs and provide production and recovery services tailored to their requirements.

Avatao

Avatao

Avatao is an online training platform for building secure software, offering a rich library of hands-on IT security exercises for software engineers to teach secure programming.

National Accreditation Authority Hungary (NAH)

National Accreditation Authority Hungary (NAH)

NAH is the national accreditation body for Hungary. The directory of members provides details of organisations offering certification services for ISO 27001.

Nova Leah

Nova Leah

Nova Leah helps connected medical device manufacturers meet cybersecurity compliance requirements throughout the entire product lifecycle.

Cypress Data Defense

Cypress Data Defense

Cypress Data Defense helps clients build secure applications by providing training, best practices, and evaluating security during every stage of the Secure Application Development Lifecycle.

UnderDefense

UnderDefense

UnderDefense provides cyber resiliency consulting and technology-enabled services to anticipate, manage and defend against cyber threats.

NWN Corp

NWN Corp

NWN Corporation is a leading Cloud Communications Service Provider (CCSP) focused on transforming the customer and workspace experience for commercial, enterprise and public sector organizations.

PacketViper

PacketViper

PacketViper’s Deception360 actively defends networks with deception-based threat detection and automated response to both external and internal cyber threats.

LimaCharlie

LimaCharlie

LimaCharlie gives security teams full control over how they manage their security infrastructure. Get full visibility, build what you want, control your data, get the security capabilities you need.

Transparity Cyber

Transparity Cyber

Transparity Cyber is dedicated to cybersecurity. As part of the Transparity Group we’re an established name in the Microsoft Cloud landscape, with a focus on cybersecurity excellence.

Segra

Segra

Segra owns and operates one of the nation’s largest fiber networks and provides best-in-class broadband and data security solutions throughout the Southeast and Mid-Atlantic.